Topic Review
Cryptography: From Ancient Secrets to Modern Encryption
This research explores the fascinating history of cryptography from its earliest origins to the modern era of digital encryption. It covers the development of various encryption methods throughout history, including substitution and transposition ciphers, the Enigma machine, and the birth of modern cryptography in the computer age. The research also discusses the breakthroughs in public key cryptography and emerging technologies such as quantum cryptography. Additionally, it highlights the pioneers in the field, including Alan Turing and Claude Shannon, and provides advice for those seeking to become experts in cryptography. Despite ongoing debates over encryption and privacy, cryptography remains an essential tool for protecting sensitive information and ensuring the privacy of individuals and organizations around the world.
  • 776
  • 22 May 2023
Topic Review
Local Zeta-Function
In number theory, the local zeta function Z(V, s) (sometimes called the congruent zeta function) is defined as where Nm is the number of points of V defined over the mth cyclotomic field extension Fqm of Fq, and V is a non-singular n-dimensional projective algebraic variety over the field Fq with q elements. By the variable transformation u = q−s, then it is defined by as the formal power series of the variable [math]\displaystyle{ u }[/math]. Equivalently, the local zeta function sometimes is defined as follows: In other word, the local zeta function Z(V, u) with coefficients in the finite field Fq is defined as a function whose logarithmic derivative generates the numbers Nm of the solutions of equation, defining V, in the m degree extension Fqm.
  • 776
  • 21 Oct 2022
Topic Review
Mars Rover Mastcam Images
The Curiosity rover has landed on Mars since 2012. One of the instruments onboard the rover is a pair of multispectral cameras known as Mastcams, which act as eyes of the rover.
  • 776
  • 28 Oct 2021
Topic Review
Authority-Based Conversation Tracking in Twitter
Twitter is undoubtedly one of the most widely used data sources to analyze human communication. The literature is full of examples where Twitter is accessed, and data are downloaded as the previous step to a more in-depth analysis in a wide variety of knowledge areas. Unfortunately, the extraction of relevant information from the opinions that users freely express in Twitter is complicated, both because of the volume generated—more than 6000 tweets per second—and the difficulties related to filtering out only what is pertinent to our research. Inspired by the fact that a large part of users use Twitter to communicate or receive political information, we created a method that allows for the monitoring of a set of users (which we will call authorities) and the tracking of the information published by them about an event. Our approach consists of dynamically and automatically monitoring the hottest topics among all the conversations where the authorities are involved, and retrieving the tweets in connection with those topics, filtering other conversations out. Although our case study involves the method being applied to the political discussions held during the Spanish general, local, and European elections of April/May 2019, the method is equally applicable to many other contexts, such as sporting events, marketing campaigns, or health crises.
  • 776
  • 28 Oct 2020
Topic Review
Population Ecology
Population ecology is a sub-field of ecology that deals with the dynamics of species populations and how these populations interact with the environment, such as birth and death rates, and by immigration and emigration. The discipline is important in conservation biology, especially in the development of population viability analysis which makes it possible to predict the long-term probability of a species persisting in a given patch of habitat. Although population ecology is a subfield of biology, it provides interesting problems for mathematicians and statisticians who work in population dynamics.
  • 776
  • 19 Oct 2022
Topic Review
Developments in Algorithms for Sequence Alignment
Pairwise sequence alignment is the basis of multiple sequence alignment and mainly divided into local alignment and global alignment. The former is to find and align the similar local region, and the latter is end-to-end alignment. A commonly used global alignment algorithm is the Needleman–Wunsch algorithm, which has become the basic algorithm that is used in many types of multiple sequence alignment software. The algorithm usually consists of two steps: one is calculating the states of the dynamic programming matrix; and the other is tracking back from the final state to the initial state of the dynamic programming matrix to obtain the solution of alignment. Time and space complexity of pairwise sequence alignment algorithms based on dynamic programming is O(l1l2), where l1 and l2 are the lengths of the two sequences to be aligned. Such overheads are acceptable for short sequences but not for sequences with more than several thousand sites. As a space-saving strategy of the dynamic programming algorithm, the Hirschberg algorithm is able to complete alignment by the space complexity of O(l) without any sacrifice of quality.
  • 775
  • 22 Apr 2022
Topic Review
Secure Bluetooth Communication in Smart Healthcare Systems
Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that deliver long-term benefits to critical infrastructures, such as smart healthcare. Many of the IoMT devices in smart cities use Bluetooth technology for short-range communication due to its flexibility, low resource consumption, and flexibility. As smart healthcare applications rely on distributed control optimization, artificial intelligence (AI) and deep learning (DL) offer effective approaches to mitigate cyber-attacks. 
  • 774
  • 21 Nov 2022
Topic Review
News Feed
News Feed is a feature of the social network Facebook. The web feed is the primary system through which users are exposed to content posted on the network. News Feed highlights information that includes profile changes, upcoming events, and birthdays, among other updates. Using a proprietary method, Facebook selects a handful of updates to show users every time they visit their feed, out of an average of 2,000 updates they can potentially receive. Over two billion people use Facebook every month, making the network's News Feed the most viewed and most influential aspect of the news industry.
  • 772
  • 03 Nov 2022
Topic Review
Machine Learning Approaches in SCRM
Machine learning (ML) has already been implemented within the supply chain risk management (SCRM) field, both in theory and in practice. The applied examples relate primarily to the early identification of production, transport, and supply risks in order to counteract potential supply chain problems quickly. Through the analyzed case studies, we were able to identify the added value that ML integration can bring to the SCRM.
  • 772
  • 28 Sep 2021
Topic Review
Convolution (Computer Science)
In computer science, specifically formal languages, convolution (sometimes referred to as zip) is a function which maps a tuple of sequences into a sequence of tuples. This name zip derives from the action of a zipper in that it interleaves two formerly disjoint sequences. The reverse function is unzip which performs a deconvolution.
  • 772
  • 28 Sep 2022
  • Page
  • of
  • 371
Video Production Service